Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks

Abstract

Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of an node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofing attackers, determining the number of attackers, localizing multiple adversaries and eliminating them is a challenging task in Wireless Sensor Network. The K-Means clustering approach is used to detect the spoofing attackers and localize them. This approach did not predict the attackers accurately. To overcome this problem, this paper proposes Chronological Likelihood Fraction Test (CLFT) as a fast and effective mobile replica node detection scheme to detect the spoofing attackers when the node is fixed or in movement. In addition, it uses the inherited spatial correlation of Received Signal Strength (RSS) from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi class detection problem. The Support Vector Machines (SVM) method is used to train the data to further improve the accuracy of determining the number of attackers. Analytical and simulation experiments result shows that the proposed scheme detects the attackers in Wireless Sensor Network in an efficient and robust manner at the cost of reasonable overheads.

Authors and Affiliations

P. Kiruthika Devi, Dr. R. Manavalan

Keywords

Related Articles

Experimental Study of Light Weight Concrete Using PP Fiber

Concrete is acknowledged to be a relatively brittle material when subjected to normal stresses and impact loads, where tensile strength is approximately just one tenth of its compressive strength. the addition of steel...

Comparison of Microwave and Optical Wireless Inter-Satellite Links

microwaves inter-satellite links are considered as the traditional technology of space satellite to satellite communication systems. However, the major next step in the evolution of satellite communication technology is...

An Optimized Survey on Security Issues in Mobile Adhoc Network

Security has become a prime concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wire line networks, the unique characteristics of mobile ad hoc networks pose a n...

Water Monitoring System for Hydroponics Agriculture

Hydroponics is a concept which is a part of hydro culture and is a method of growing plants in water , without soil using only the mineral nutrient solutions. The nutrients in hydroponics system can be from fish waste,...

Fertility, Parity Progression Ratio and Population Growth of Assam: A Statistical Analysis

The study of fertility provides important information about women reproductive behavior and attitudes. The study of religious differentials in fertility is all the more important and intriguing in the case of Assam beca...

Download PDF file
  • EP ID EP19604
  • DOI -
  • Views 260
  • Downloads 4

How To Cite

P. Kiruthika Devi, Dr. R. Manavalan (2015). Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://europub.co.uk./articles/-A-19604